Workflow
Cryptography
icon
Search documents
X @mert | helius.dev
mert | helius.dev· 2025-10-18 10:31
RT sacha 🦣 (@ssaintleger)my answer to why zcash can't be copied (even if you somehow manage to bootstrap a $1bn+ shielded pool and a mission driven group of world class cryptographers)"firstly, what you can't copy is the proof of work distribution over 10 years... with no premine, with no ICO, with 10 years of down only, with miners having to sell all the timesecondly, it's very difficult to get a social layer that has people that have lived through the cypherpunk era, in the 1980s in the 1990s, when they h ...
X @vitalik.eth
vitalik.eth· 2025-10-18 05:28
Efficiency Metrics in Cryptography - The industry suggests reporting cryptographic overhead as a ratio of in-cryptography computation time versus raw computation time [1] - This ratio provides a hardware-independent measure of efficiency loss when using cryptographic applications instead of trust-dependent ones [1] - Overhead factor aids developers in estimating cryptographic computation time based on their existing knowledge of raw computation time [1] Challenges in Overhead Measurement - Measuring overhead is complex due to heterogeneous operations in execution and proving, especially with SIMD/parallelization and memory access patterns [2] - Despite imperfections, the industry believes overhead factor remains a valuable metric [2]
X @mert | helius.dev
mert | helius.dev· 2025-10-13 19:02
Privacy Technology - The industry emphasizes that privacy relies on both technology and user behavior [1] - The industry suggests zk-SNARK privacy is superior to decoy privacy (ring signatures) due to its deterministic nature [1] - Determinism is mathematically superior to probabilities in privacy systems [1] - The industry highlights that technology is the single point of failure in privacy systems, regardless of user opsec [1] Cryptocurrency Ecosystem - The industry criticizes the argument that XMR's privacy is solely due to its limited exchange availability [1] - The industry believes the "cryptography" aspect of cryptocurrency is crucial for privacy [1] - The industry advocates for collaboration among privacy systems against surveillance, rather than competition [1]
X @Polyhedra
Polyhedra· 2025-10-13 12:30
Technology & Security - zkPyTorch 可以加密证明 Gemma-3 的结果,确保数据安全 [1] - 该技术确保每次计算都可验证 [1] Artificial Intelligence - AI 应用广泛,但如何信任其输出是一个问题 [1]
X @Nick Szabo
Nick Szabo· 2025-10-12 01:45
Geopolitical & Economic Analysis - The US political system mirrors the late Roman empire, exhibiting similar characteristics such as a corrupt senate, over-extended military, and currency debasement [1] - Globalism is perceived as declining, creating opportunities for agorists and cypherpunks who leverage new technologies [3] - Elites are investing in AI for control and perception engineering [4] Technological & Cryptographic Focus - Hard cryptography is identified as a crucial tool for resistance, enabling sovereign economies, free speech, and community defense in ungovernable internet spaces [4] - The crypto industry is urged to recognize the importance of hard cryptography and its potential value [5] Societal & Ideological Commentary - Current societal trends, including neo-christianity and MAGA, are viewed as ineffective solutions, with a call for a return to local community, nations, and patriotic ethno-regionalism [2] - Progressive elites are described as aiming to accelerate big tech and asteroid mining, potentially requiring mass conscription of labor [3]
X @mert | helius.dev
mert | helius.dev· 2025-10-10 11:11
crypto without privacy is not crypto ...
X @Cointelegraph
Cointelegraph· 2025-10-09 04:00
🔥 TODAY: Ethereum Foundation announces “Privacy Cluster” composed of 47 top researchers, engineers, and cryptographers to expand privacy efforts for the Ethereum L1 network. https://t.co/9nLPROdwgP ...
X @Nick Szabo
Nick Szabo· 2025-10-08 01:31
RT 941 (@level941)Gold survived millennia because no alternative could outperform it under analog conditions. Once computation and cryptography arrived, the constraint lifted.The Lindy clock resets when a new medium performs the same function with less trust.Bitcoin is that reset.Szabo wrote about all this already.Satoshi also mentioned this would happen.This debate was already coded. ...
X @Anthony Pompliano 🌪
Anthony Pompliano 🌪· 2025-10-02 13:31
National Security Implications - Cryptography is drastically underestimated in its importance to US national security interests [1] - Zero-knowledge proofs are a fascinating area of development with potential national security use cases [1][6:31] - Blockchain technology holds significant value [19:31] Technological Opportunities & Challenges - AI and proof of human vs machine interactions present major opportunities [13:51] - Technical obstacles remain in the field [23:50] - There is a need to cut costs and improve efficiency [26:23] Applications & Integrations - Zero-knowledge proofs have applications in Bitcoin and crypto, including in regions like Afghanistan [1:34] - Bitcoin integration and future tech are areas of interest [29:39]
Bitcoin & Crypto Is An Intelligence Tool?!
Anthony Pompliano· 2025-10-01 21:15
National Security & Cryptography - Zero-knowledge proofs are fundamental for secure information sharing, especially for satellites and secure networks, to prevent adversarial operations like network interference or false information injection [2] - The intelligence apparatus uses technologies like stablecoins and Bitcoin as tools, while also working to disrupt adversaries' use of the same tools [1][2] - Cryptography and automation can improve KYC processes, ensuring user information is protected even if a product is hacked [2] - Verifying cryptographic proofs on national identities is foundational for national security, linking digital finance innovations to real people and countries under actual laws [2] Technology & Scalability - ZK proofs are becoming increasingly sophisticated and performant, requiring specialized systems and networks to handle the value chain [3] - The industry is shifting from 80% R&D and 20% application to 20% R&D and 80% application, focusing on getting products into the market [3] - Ziki Verify is designed for verifying cryptographic proofs at scale, aiming to be the world's best in speed and magnitude [3] - The company is processing approximately 135 million proofs per year and anticipates scaling to billions, requiring further advancements in dedicated infrastructure [6] Cost & Efficiency - Specialization and offloading computation from expensive networks like Ethereum can lead to significant cost reductions, potentially making certain types of proofs virtually costless [6] - The company advertises a 90% cost reduction relative to Ethereum for certain types of proofs [6] Applications & Future Trends - There's a growing need for private execution environments for AI, where algorithms can train on private data without public exposure, using cryptography to verify the data's authenticity [3][4] - Digital identity for machines is emerging as a significant category, ensuring authorized machines interact correctly and don't go off the rails [4] - The vision is to support trillions of cryptographic transactions due to the proliferation of intelligent devices, machines, and humans engaging in the digital world [5]